Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example wou...
详细信息
Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an accesscontrol mechanism. Our implementation of context differentiates between closely located subareas within the same location. We have modified the Android operating system so that context-based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our accesscontrol mechanism and the accuracy of context detection.
We present, CoDRA, an accesscontrol system for Android that offers context-based dynamically configurable restrictions, fine-granular policy and ability to enforce various policy configurations at different levels of...
详细信息
We present, CoDRA, an accesscontrol system for Android that offers context-based dynamically configurable restrictions, fine-granular policy and ability to enforce various policy configurations at different levels of system operation. The fine grained policy and policy diversification are achieved through the application of contextbased on resource features. Policies are established and classified, as system-wide and application-wise, after careful examination on application activities. The dynamic generation and enforcement of policies enables greater protection for open resources, e.g., sensors. CoDRA enforces different policy configuration on user basis through its integration of multiuser support in Android. A simple graphical control panel is provided for policy administration. CoDRA performance and overhead were analysed by testing 55 popular applications in Nexus 5 and 9 devices. The results proved that CoDRA successfully fulfilled its objectives by introducing 1-20 ms executional overhead. It occupied about 800kB memory for policy storage and 5kB of memory for every additional user context space. The evaluation also proved that the tested applications did not exhibit any adverse effects during execution even with full restriction, and higher granularity in policies.
As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible accesscontrol mechanisms. Unlike traditional approaches based on the identity/role for accesscontrol, ...
详细信息
ISBN:
(纸本)9783037854693
As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible accesscontrol mechanisms. Unlike traditional approaches based on the identity/role for accesscontrol, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic-aware context-based access control framework (called SA_CBAC) to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. In order to handle context information in the framework, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. This paper also focuses on accesscontrol policies and addresses these issues by representing context, user attributes and resource attributes in knowledge base and extending XACML to incorporate the knowledge base.
Smartphone have more and more sensors which have given a wealth of experiences to users. In Android system, once one application is granted permissions to access sensors, its behavior is not monitored any more. Some m...
详细信息
ISBN:
(纸本)9781467390880
Smartphone have more and more sensors which have given a wealth of experiences to users. In Android system, once one application is granted permissions to access sensors, its behavior is not monitored any more. Some malicious applications make use of this vulnerability to steal privacy. For example, a malicious program named "Eavesdropping thieves" can obtain the microphone access permission to open the microphone covertly to record users' calls and transmits them to hackers' mailboxes. Existed methods are not acceptable to solve this privacy leakage threat very well. A monitor framework for sensors access in smartphone has been proposed The framework monitors applications accessing sensors and adjusts the applications' access capabilities according to the context automatically. The prototype has showed that the framework can prevent privacy leakage through sensors and achieve better security in smartphone.
Smartphone have more and more sensors which have given a wealth of experiences to users. In Android system, once one application is granted permissions to access sensors, its behavior is not monitored any more. Some m...
详细信息
Smartphone have more and more sensors which have given a wealth of experiences to users. In Android system, once one application is granted permissions to access sensors, its behavior is not monitored any more. Some malicious applications make use of this vulnerability to steal privacy. For example, a malicious program named "Eavesdropping thieves" can obtain the microphone access permission to open the microphone covertly to record users ' calls and transmits them to hackers ' mailboxes. Existed methods are not acceptable to solve this privacy leakage threat very well. A monitor frame work for sensors access in smartphone has been proposed. The framework monitors applications accessing sensors and adjusts the applications' access capabilities according to the context automatically. The prototype has showed that the framework can prevent privacy leakage through sensors and achieve better security in smartphone.
In this paper we present a context-aware RBAC (CA-RBAC) model for pervasive computing applications. The design of this model has been guided by the context-based access control requirements of such applications. These...
详细信息
ISBN:
(纸本)9781605581293
In this paper we present a context-aware RBAC (CA-RBAC) model for pervasive computing applications. The design of this model has been guided by the context-based access control requirements of such applications. These requirements are related to users' memberships in roles, permission executions by role members, and context-based dynamic integration of services in the environment with an application. context information is used in role admission policies, in policies related to permission executions by role members, and in policies related to accessing of dynamically interfaced services by role members. The dynamic nature of context information requires model-level support for revocations of role memberships and permission activations when certain context conditions fail to hold. based on this model we present a programming framework for building context-aware applications, providing mechanisms for specifying and enforcing context-based access control requirements.
暂无评论